Hi,

By default, camel-jetty create a new connector: it doesn't use the one
provided by pax-web. If you want to "plug" into the pax-web jetty
connector, you have to use camel-servlet.

camel-jetty fully creates a new jetty connector, so the TLS
configuration has to be set on camel-jetty.

Regards
JB

On 03/02/2020 11:52, Gerald Kallas wrote:
> I tried this setting
> 
> org.ops4j.pax.web.ssl.protocols.included = TLSv1.2
> 
> in
> 
> org.ops4j.pax.web.cfg.
> 
> But this doesn't have any effect.
> 
> Still the same, I'm getting in the log
> 
> 2020-02-03T02:00:35,872 | INFO  | Blueprint Event Dispatcher: 1 | 
> JettyHttpComponent9              | 105 - org.apache.camel.camel-jetty - 3.0.1 
> | Connector on port: 8443 is using includeCipherSuites: [] 
> excludeCipherSuites: [^.*_(MD5|SHA|SHA1)$, ^TLS_RSA_.*$, ^SSL_.*$, 
> ^.*_NULL_.*$, ^.*_anon_.*$] includeProtocols: [] excludeProtocols: [SSL, 
> SSLv2, SSLv2Hello, SSLv3]
> 
> Any idea where I can set the includeProtocols value?
> 
> Best
> - Gerald
> 
>> Gerald Kallas <catsh...@mailbox.org> hat am 3. Februar 2020 09:46 
>> geschrieben:
>>
>>  
>> Tested with cURL
>>
>> curl --insecure -v https://host:8443/say/hello
>> *   Trying 10.0.0.147...
>> * TCP_NODELAY set
>> * Connected to host (10.0.0.147) port 8443 (#0)
>> * ALPN, offering h2
>> * ALPN, offering http/1.1
>> * successfully set certificate verify locations:
>> *   CAfile: /etc/pki/tls/certs/ca-bundle.crt
>>   CApath: none
>> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
>> * TLSv1.3 (IN), TLS alert, handshake failure (552):
>> * error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure
>> * Closing connection 0
>> curl: (35) error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake 
>> failure
>>
>> Seems that the fallback to TLSv1.2 isn't possible
>>
>> So, where is the place to enable TLSv1.2 for camel-jetty?
>>
>> Best
>> - Gerald
>>
>>
>>> Gerald Kallas <catsh...@mailbox.org> hat am 3. Februar 2020 09:00 
>>> geschrieben:
>>>
>>>  
>>> Thanks JB,
>>>
>>> I did not install bouncycastle.
>>>
>>> I did install camel-jetty only as Karaf feature. The underpinning Jetty for 
>>> the Karaf web console is working fine with HTTPS. So far I wonder what I'm 
>>> still missing that camel-jetty could work also with HTTPS.
>>>
>>> Best
>>> - Gerald
>>>
>>>> Jean-Baptiste Onofré <j...@nanthrax.net> hat am 3. Februar 2020 05:57 
>>>> geschrieben:
>>>>
>>>>  
>>>> Hi,
>>>>
>>>> do you have bouncycastle installed ?
>>>>
>>>> Regards
>>>> JB
>>>>
>>>> On 03/02/2020 00:29, Gerald Kallas wrote:
>>>>> Dear community,
>>>>>
>>>>> I'm going to access some camel-jetty driven consumer endpoints and 
>>>>> getting a
>>>>>
>>>>> SSL_ERROR_NO_CYPHER_OVERLAP
>>>>>
>>>>> error. The web console nevertheless is working well.
>>>>>
>>>>> Any hints are appreciated.
>>>>>
>>>>> That's the jetty.xml section
>>>>>
>>>>>   <New id="httpConfig" class="org.eclipse.jetty.server.HttpConfiguration">
>>>>>           <Set name="secureScheme">https</Set>
>>>>>           <Set name="securePort">
>>>>>                   <Property name="jetty.secure.port" default="8443" />
>>>>>           </Set>
>>>>>           <Set name="outputBufferSize">32768</Set>
>>>>>           <Set name="requestHeaderSize">8192</Set>
>>>>>           <Set name="responseHeaderSize">8192</Set>
>>>>>           <Set name="sendServerVersion">true</Set>
>>>>>           <Set name="sendDateHeader">false</Set>
>>>>>           <Set name="headerCacheSize">512</Set>
>>>>>   </New>
>>>>>
>>>>> P.S. I'm running
>>>>>
>>>>> openjdk version "1.8.0_242"
>>>>> OpenJDK Runtime Environment (build 1.8.0_242-b08)
>>>>> OpenJDK 64-Bit Server VM (build 25.242-b08, mixed mode)
>>>>> Karaf 4.2.7
>>>>> Camel 3.0.1
>>>>>
>>>>> Best
>>>>> - Gerald
>>>>>
>>>>
>>>> -- 
>>>> Jean-Baptiste Onofré
>>>> jbono...@apache.org
>>>> http://blog.nanthrax.net
>>>> Talend - http://www.talend.com

-- 
Jean-Baptiste Onofré
jbono...@apache.org
http://blog.nanthrax.net
Talend - http://www.talend.com

Reply via email to